International Journal of Enterprise Computing and Business Systems

Transcription

1 PREVENTING CYBER CRIME: A STUDY REGARDING AWARENESS OF CYBER CRIME IN TRICITY Ms.Arpana(PhD in Progress) Lecturer GJIMT, Ph-II,Mohali,India Dr.Meenal Chauhan Assistant Professor GJIMT,Ph-II, Mohali, India Abstract Computer crime also referred as Cybercrime has increased in severity and frequency in the recent years and because of this, it has become a major concern for companies, universities and organizations. Worldwide governments, police departments and intelligence units have started to react. In this paper, we provide an overview of Cybercrime and examine the awareness among different respondents on the issue of Cyber Crime, to emphasize the severity of this problem and the urgent need to limit its impact worldwide. Keywords: Cyber Crime, Law, Internet Crime, Awareness 1. Introduction From personal computers in the home used to track checking accounts and keep household inventories in databases to large supercomputers that control space missions and run the world's largest companies, computers have become commonplace. The number of individuals who have access to the information on those computers has increased as the communications

2 industry has undergone a revolution in recent years, and uncontrolled access to information presents a very real threat in most business and some government information. When the Internet was developed, the founding fathers of the Internet hardly had any inclination that the Internet could also be misused for criminal activities. Today, there are many disturbing things happening in cyberspace. Obviously, it was just a matter of time before criminals discovered the advantages of computers and make it increasingly possible to get proprietary information of financial institutions and other firms. Because of the highly significant role that computers play in modern life, there is a need to keep information on machines secure from tampering, from unauthorized dissemination, and from unauthorized removal. 2. Definition of Cyber Crime The term 'cyber crime' has not been defined in any Statute or Act. The Oxford Reference Online defines 'cyber crime' as crime committed over the Internet. The Encyclopedia Britannica defines 'cyber crime' as any crime that is committed by means of special knowledge or expert use of computer technology. So what exactly is Cyber Crime. Cyber Crime could reasonably include a wide variety of criminal offences and activities. A generalized definition of cyber crime may be "unlawful acts wherein the computer is either a tool or target or both". CBI Manual defines cyber crime as: (i) Crimes committed by using computers as a means, including conventional crimes. (ii) Crimes in which computers are targets.

3 The Information Technology Act, 2000, does not define the term 'cyber crime. Cyber crime can generally defined as a criminal activity in which information technology systems are the means used for the commission of the crime. Based on the United Nations General Assembly resolution of January 30, 1997, the Government of India passed the Information Technology Act 2000 (Act No.21 of 2000) and notified it on October 17, The Information Technology Act, 2000, is the first step taken by the Government of India towards promoting the growth of the E-commerce and it was enacted with a view to provide legal recognition to e-commerce and e-transactions, to facilitate e- governance and prevent computer-based crimes. It is a first historical step. However, the rapid increase in the use of Internet has led to a spate in crime like child pornography, cyber terrorism, publishing sexually explicit content in electronic form and video voyeurism. The need for a comprehensive amendment was consistently felt and after sufficient debate and much deliberation, the I.T. Amendment Act 2008 was passed. The ITAA 2008 got the President s assent in February 2009 and was notified with effect from The new IT Amendment Act 2008 has brought a large number of cyber crimes under the ambit of the law. Some of the significant points in the Amendment Act include introduction of corporate responsibility for data protection with the concept of reasonable security practices (Sec.43A), recognition of Computer Emergency Response Team India (CERT-In) as the national nodal agency empowered to monitor and even block web-sites under specific circumstances, introduction of technological neutrality replacing digital signatures with electronic signatures etc. Besides, the CERT-In will also assist members of the Indian Community in implementing proactive measures to reduce the risks of computer security incidents. The IT Act provides legal recognition for transactions carried out by means of electronic data interchange, and other means of electronic communication, commonly referred to as "electronic commerce", involving the use of alternatives to paper-based methods of communication and

4 storage of information. The IT Act facilitates electronic filing of documents with the Government agencies. 3. Literature Review Cyber-crime or computer crime is considered to be any crime that uses a computer and a computer network (Matthews, 2010). A basic definition describes cybercrime as a crime where computers have the possibility of playing an important part (Thomas and Loader, 2000). The main factor in cyber-crime increase is the Internet. By use of Internet, cybercriminals often appeal to images, codes or electronic communication in order to run malicious activities. Among the most important types of Internet crimes we can mention: identity theft, financial theft, espionage, pornography, or copyright infringement. The cyber-crimes can be divided into two categories: the crimes where a computer network attacks other computers networks e.g. a code or a virus used to disable a system, and, the second category, crimes where a computer network attacks a target population e.g. identity theft, fraud, intrusions (Svensson, 2011). Issues revolving around cyber-crime have become more and more complex. Computer criminal activities have grown in importance and institutions are more interested than ever in putting an end to these attacks. Progressions have been made in the development of new malware software, which can easily detect criminal behavior (Balkin et al., 2007). Moreover, high quality anti-virus systems are offered for free now in many countries at every purchase of a computer or an operating system. 4. Objective and Hypothesis of Study The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in national capitals. This study investigates whether

5 or not people would use the Internet to report crime. The pin pointed objectives of the study is to find out awareness among different respondents on the issue of Cyber Crime. H1: It has been assumed that there is no association between Respondents Occupation and the level of awareness. 5. Methodology 5.1 Research Strategy Quantitative research in the form of a survey instrument has been used to collect the data and descriptive statistics have been used to analyse and present the data. The decision to follow a quantitative research methodology was based on the fact that the results of the survey should be a representative sample of the total population. 5.2 Research Questions Due to the exploratory nature of the research, research questions were derived from the literature. These questions provided a basis for the research in order to find the awareness of cyber Crime among respondents. Also to find out what type of Cyber Crimes are occurring these days and what should be done to prevent Cyber Crime 5.3 Sample and Respondents The primary target respondent was a working professional who was aware of the various computer crime and security issues within his/her organization. Typically, these were senior managers, IT administrators as well as any IT security consultants. Simple random sampling was the primary sampling method used when selecting the sample for this survey.

6 6. Result and Findings In conducting the research, the author used SPSS 13.0 software program and take the hypothesis that there is no association between Respondents Occupation and the level of Cyber Crime Awareness. The Figure1 shows that, 33% Student, 13% IT Professional, 33% Businessman and 13% Advocate respondents think that major drawback, which prevent Cyber Crime from being solved in India is Lack of awareness among people

7 The Figure2 shows that, 58% student, 42% IT Professionals,37% businessman and 61% advocates respondents are of view that Law enforcement agencies are not fully equipped

8 The Figure 3 shows that, Rest 9% students, 45% IT Professional, 30% Businessman and 26% advocate respondents feels that all the factors are responsible which prevent cyber crime to be solved in India. The Figure4 shows that, On the issue of spread of Disease Cyber Crime these days 25% student, 53% IT Professional, 59% Businessman and 22% Advocates respondents feels that it is spreading very fastly and 33% student, 31% IT Professional,18.5% Businessman and 52% Advocates respondents said that it is spreading at average where as 42% student,16% IT Professional,22.5% Businessman and 26% Advocates believes that it is spreading very slowly

9 Table 1 Expected Frequencies (Association between Respondents Occupation and the level of Cyber Crime Awareness) Cyber Crime Awareness Occupation Average Good Total Value of Chi-square Student IT Professional Businessman Advocate Total Since the calculated value of χ2 is less than the table value (7.815). The hypothesis holds true. 7. Conclusion Results revealed the importance of awareness as a tool to decrease/ prevent cyber crime. Therefore it is concluded that there is no association between the Respondents Occupation and Level of Awareness. This is due to the fact that it is a common misconception that leads to the underestimation of the threat that can be brought to the society. One of the most significant results is in relation to the possible reaction of the population to the threats of cyber crime. This is on the basis of the level of awareness of the members of the population on the issue of cyber crime. Some can dismiss the issue as unimportant due to the fact that the crime occurs in the virtual world that can be considered as unreal by some. This is due the fact that these individuals has less access to the cyber world and have no background information on the possible effects that can be incurred from the occurrence of cyber crime.

10 There will always be new and unexpected challenges to stay ahead of cyber criminals and cyber terrorists but we can win only through partnership and collaboration of both individuals and government. There is much we can do to ensure a safe, secure and trustworthy computing environment. It is crucial not only to our national sense of well-being, but also to our national security and economy. It is not so easy and possible to eliminate cyber crime once for all in view of the latest scientific development. However, it is quite possible to combat and check the cyber crimes. To achieve that object, the first and foremost requirement is the awareness among the public about the cyber crimes and the precautions to prevent the same. 8. References Serban, C. (2011). Partnership in social marketing programs. Socially responsible companies and non-profit organizations engagement in solving society s problems. Amfiteatru Economic, XIII (29),pp Svensson, P. (2011). Nasdaq hackers target service for corporate boards. Retrieved from Matthews, B. (2010). Computer Crimes: Cybercrime Information, Facts and Resources. Retrieved from Balkin, J. M. et al. (2007). Cybercrime: digital cops in a networked environment. New York: New York University Press (NYU). Thomas, D., and Loader, B. (2000). Cybercrime: law enforcement, security and surveillance in the information age. London: Routledge.

An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication

The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The

Role and Improvement in Cyber Laws for E- System Alka Singhal Lecturer, Commerce Department, Vaish College, Rohtak, Haryana (India) alkagarg74@gmail.com Abstract This paper addresses the role and improvement

Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime

Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

Cybercrime : Malaysia By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police ICT Development The ICT development within this region has been rapid since more than 3 decades ago. With the launching of the

Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national

COU CIL OF THE EUROPEA U IO EN Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime 2987th JUSTICE and HOME AFFAIRS Council meeting Brussels, 27-28 ovember 2008 The

Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or

Data protection and outsourcing industry - A study By Kumar Mihir Scientia Potenti Est- Knowledge is power. The said maxim is apt to describe the primary business model in the 21 st century when information

Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

Appendix 1 NEW ZEALAND S CYBER SECURITY STRATEGY June 2011 New Zealand Government 7 June 2011 ISBN: 978-0-478-38200-6 www.med.govt.nz/cyberstrategy MED11 Foreword from the Minister The Internet and digital

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

DATA PROTECTION LAWS OF THE WORLD India Date of Download: 6 February 2016 INDIA Last modified 27 January 2016 LAW IN INDIA There is no specific legislation on privacy and data protection in India. However,

COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences

Developments in cybercrime and cybersecurity Developments in cybercrime and cybersecurity As customers and clients increasingly go online to do their banking with convenience, privacy and security their

on the coverage of crime statistics 23 January 2014 1 Introduction This discussion has been produced in response to questions about the coverage of official statistics on crime, in particular, the extent

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics

Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

Cyber Risk Management A short guide to best practice Insight October 2014 So what exactly is 'cyber risk'? In essence, cyber risk means the risk connected to online activity and internet trading but also

Peace and Justice in Cyberspace Potential new international legal mechanisms against global cyberattacks and other global cybercrime An International Criminal Tribunal for Cyberspace International cybercrime

System Access, Acceptable Use And Internet Safety Policy Adopted: November 2005 Revised: April 2009, April 2011, February 2014 1 2 3 4 5 6 7 8 9 Purpose The purpose of this policy is to define expectations

SAN BERNARDINO CITY UNIFIED SCHOOL DISTRICT is providing employees access to the district s electronic network. This network includes Internet access, computer services, videoconferencing, computer equipment

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE Identity is the unique set of characteristics that define an entity or individual. Identity theft is the unauthorized use of an individual

4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate

For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs

FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States

Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

Global IT Security Risks: 2012 Kaspersky Lab is a leading developer of secure content and threat management solutions and was recently named a Leader in the Gartner Magic Quadrant for Endpoint Protection

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the

Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services

IQware's Approach to Software and IT security Issues The Need for Security Security is essential in business intelligence (BI) systems since they have access to critical and proprietary enterprise information.

Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from

Top Five Things You Need to Know About Cybersecurity Larry Mattox, VC3 Session #7 Cyber breaches are more sophisticated and can happen to any size organization. Victims of Cyber-espionage CNN, Washington

Edith Cowan University Research Online Australian Counter Terrorism Conference Security Research Institute Conferences 2012 Cyberterrorism: Addressing the Challenges for Establishing an International Legal

Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.

Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK. A Brief History of IT Security Once upon a time, IT security was simple. Viruses were written to attack any system they came in contact with. As a result,

WEB PROTECTION Features SECURITY OF INFORMATION TECHNOLOGIES The web today has become an indispensable tool for running a business, and is as such a favorite attack vector for hackers. Injecting malicious

NATIONAL CRIME PREVENTION COUNCIL What is Cybercrime? A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal activity involving computers and networks. It can range